Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-43495: CWE-190: Integer Overflow or Wraparound in Microsoft Windows 11 version 22H2

0
High
VulnerabilityCVE-2024-43495cvecve-2024-43495cwe-190
Published: Tue Sep 10 2024 (09/10/2024, 16:54:21 UTC)
Source: CVE Database V5
Vendor/Project: Microsoft
Product: Windows 11 version 22H2

Description

CVE-2024-43495 is a high-severity integer overflow vulnerability in the libarchive component of Microsoft Windows 11 version 22H2 (build 10. 0. 22621. 0). This flaw could allow a local attacker with limited privileges and requiring user interaction to execute arbitrary code remotely by exploiting improper handling of integer values. The vulnerability impacts confidentiality, integrity, and availability, potentially enabling full system compromise. No known exploits are currently in the wild, but the vulnerability is publicly disclosed and unpatched. Organizations running the affected Windows 11 version should prioritize patching once available and apply mitigations to reduce exposure. This vulnerability is particularly relevant for environments with Windows 11 22H2 deployments, especially in countries with high Windows market share and strategic interest in cyber operations. The CVSS score of 7.

AI-Powered Analysis

AILast updated: 02/26/2026, 07:49:26 UTC

Technical Analysis

CVE-2024-43495 is an integer overflow or wraparound vulnerability classified under CWE-190, affecting the libarchive component in Microsoft Windows 11 version 22H2 (build 10.0.22621.0). Libarchive is a library used for reading and writing various archive formats, and improper handling of integer values during archive processing can lead to an overflow condition. This overflow may result in memory corruption, enabling an attacker to execute arbitrary code with elevated privileges. The vulnerability requires local access with low privileges and user interaction, such as opening a crafted archive file. The CVSS v3.1 score of 7.3 indicates a high severity, with attack vector local (AV:L), attack complexity low (AC:L), privileges required low (PR:L), user interaction required (UI:R), and impacts on confidentiality, integrity, and availability all rated high (C:H/I:H/A:H). No public exploits are known at this time, and no patches have been released yet, but the vulnerability is officially published and reserved since August 2024. The flaw could be leveraged by attackers to gain code execution and potentially escalate privileges, compromising system security and stability.

Potential Impact

The impact of CVE-2024-43495 is significant for organizations using Windows 11 version 22H2. Successful exploitation can lead to full system compromise, allowing attackers to execute arbitrary code, steal sensitive information, modify or delete data, and disrupt system availability. Since the vulnerability affects a core system library handling archive files, it can be triggered by opening malicious archives, which are common in email attachments and downloads. This increases the risk of targeted attacks and malware campaigns. The requirement for local access and user interaction limits remote exploitation but does not eliminate risk, especially in environments where users may be tricked into opening malicious files. The vulnerability poses a threat to enterprise networks, government agencies, and critical infrastructure relying on Windows 11 22H2, potentially enabling lateral movement and persistence by attackers.

Mitigation Recommendations

Until an official patch is released, organizations should implement the following mitigations: 1) Restrict local user privileges to the minimum necessary to reduce the risk of exploitation. 2) Educate users to avoid opening untrusted or unexpected archive files, especially from email or external sources. 3) Employ application whitelisting and endpoint protection solutions to detect and block suspicious archive processing activities. 4) Monitor system logs and behavior for signs of exploitation attempts or unusual activity related to archive handling. 5) Use network segmentation to limit the spread of potential compromises originating from local exploitation. 6) Prepare for rapid deployment of the official patch once available by inventorying affected systems and testing updates in controlled environments. 7) Consider disabling or restricting the use of libarchive-dependent features if feasible in critical environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
microsoft
Date Reserved
2024-08-14T01:08:33.521Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 699f6cdab7ef31ef0b5698a3

Added to database: 2/25/2026, 9:42:50 PM

Last enriched: 2/26/2026, 7:49:26 AM

Last updated: 2/26/2026, 8:04:31 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats